Mobile Security
Across
- 2. escalating privileges on a device, Bypasses operating system-imposed restrictions, Allows full control of the system
- 4. the use of GPS to track a device
- 5. Two devices linked together, A sender and a receiver, Unicast connection
- 7. (USB) Physical connectivity to your mobile device,
- 9. the ability to use device with another mobile carrier
- 10. More than two devices linked together, Multiple receivers, Single link shared with multiple devices
- 11. Radio Frequency Identifier; Examples: Hospital inventory tracking, Some passports, Building access cards, Hotel Keycards
- 15. (NFC) two-way wireless communication, payment systems, short range with encryption support
- 16. Mobile devices, “cellular” phones, Service area divided into “cells” Towers cover each cell, 3 towers serve each call, can triangulate phone’s location
- 17. Ability to remotely remove data from mobile device
- 18. remote capture, jam known frequencies, replay/replay attack, loss of device control
- 20. Device can capture network data, Lost phone can carry sensitive data, Encrypt your data!, Man-in-the-middle, Mobile device could sniff network traffic, Denial of Service, Frequency interference with company wifi, “Hotspot” could be Rouge Access Point, Exfiltrate internal data via cellular,
- 21. separating device functions, One container holds all the work-related data, One container holds all the personal data, Can have other containers
Down
- 1. (GPS) sattelibe-based radio navigation, geolocation
- 3. Controlling content, What content is available to applications
- 6. Updating the firmware to stay up to date, Secures device, Fixing problems as reported or discovered
- 8. (MDM)Policy can include: Encrypt data on each device, Auto-lock a device after certain amount of inactivity, Force use of strong passwords, Wipe device automatically if too many fail log-in attempts, Remotely lock device if lost/stolen, Remotely wipe device if lost/stolen
- 12. Management Controlling apps hard because always being added and changing,company can whitelist certain apps
- 13. ability to determine device’s location, Can only use a device inside (or outside) boundary, Can only allow certain actions inside (or outside) boundary
- 14. installing apps not authorized by official app store
- 19. Short-wave UHF radio waves, 2.402 GHz to 2.48GHz, Range is very limited, One to one connection